General
-
Target
03aec2b7604db62fbcaa0a2d1f68088ac9d52a561e33815f8a3a4dde3d603465
-
Size
754KB
-
Sample
230601-q5kbqsee73
-
MD5
9dae2e21932b0741c3d6f5019cf294e0
-
SHA1
ad059ba1ea036afcd440c21d7df0c85b333a4806
-
SHA256
03aec2b7604db62fbcaa0a2d1f68088ac9d52a561e33815f8a3a4dde3d603465
-
SHA512
a356fdc7f14b02f3099272747ed6805eef1462368c3fc958dc6501ff62ab7c93061b0c87bab0204699cd7558ccc2ff04b11c3a8c228d1f6ee59e2f96ab4d1025
-
SSDEEP
12288:HMrwy90oqqyb5mjl9bQGuRt2EMLGy0PqmF3TJzjjJyr2R1dz7DipcfKBy+:PyVItmjl9N2DEGDNF3VzXJyrop7D+R
Static task
static1
Behavioral task
behavioral1
Sample
03aec2b7604db62fbcaa0a2d1f68088ac9d52a561e33815f8a3a4dde3d603465.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
03aec2b7604db62fbcaa0a2d1f68088ac9d52a561e33815f8a3a4dde3d603465
-
Size
754KB
-
MD5
9dae2e21932b0741c3d6f5019cf294e0
-
SHA1
ad059ba1ea036afcd440c21d7df0c85b333a4806
-
SHA256
03aec2b7604db62fbcaa0a2d1f68088ac9d52a561e33815f8a3a4dde3d603465
-
SHA512
a356fdc7f14b02f3099272747ed6805eef1462368c3fc958dc6501ff62ab7c93061b0c87bab0204699cd7558ccc2ff04b11c3a8c228d1f6ee59e2f96ab4d1025
-
SSDEEP
12288:HMrwy90oqqyb5mjl9bQGuRt2EMLGy0PqmF3TJzjjJyr2R1dz7DipcfKBy+:PyVItmjl9N2DEGDNF3VzXJyrop7D+R
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-